The Physical Security Interoperability Alliance releases another draft specification for IP-based surveillance device interoperability CCTV surveillance systems are notoriously proprietary. (Hey, those circuits are “closed”, after all.) The IP networking protocol is generally thought of as an ‘open’ system – but that doesn’t mean all IP-based surveillance devices work together.Members of the Physical Security Interoperability Alliance (www.psialliance.org), a consortium of approximately 50 physical security product providers, continue to tackle the issue of interoperability between IP-enabled security technologies. The group recently released a draft of what it hopes will become the second specification to standardize IP-enabled video platforms.The so-called ‘Recording and Content Management’ (RaCM) draft specification builds on a specification released earlier this year that created standards for how a video stream goes from a camera to viewers or recording devices. This latest RaCM specification takes the second step. RaCM would standardize the way recording and content management products communicate with other devices in the security ecosystem, according to PSIA member Dave Fowler, senior vice president of marketing & product development with VidSys, who co-chairs the RaCM working group.“This second area is: If you send video to recording device, how does the device handle storing it, playing it back and being able to create metadata so you can find it again?” said Fowler. Fowler said the goal is for recording devices and video management systems to enable users to have a single video management system (VMS) to view recorded video. The end result, he said, would reduce significant headaches and expensive changes that are necessary now because there is currently no interoperability protocol for existing DVR/NVR solutions.Also see VMS: How to Manage Suveillance Video“While they (DVRs/NVRs) typically have the functionality of this specification in their technology, they don’t have a standard way of communicating with systems outside their box,” said Fowler. “So this says: Instead of communicating in a proprietary format that only you can understand, here is a mapping of a format you can put your technology into that will allow anyone else that wants to talk to your box, to talk to your box.” After the group assimilates public comment from security industry professionals on the specification, it will be open for input from a wider group, said Fowler. Related content news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Electronic Health Records Electronic Health Records news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software news SpecterOps to use in-house approximation to test for global attack variations The new offering uses atomic tests and in-house approximation in purple team assessment to test all known techniques of an attack. By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing news New Trojan ZenRAT masquerades as Bitwarden password manager A report by Proofpoint identifies the new Trojan as undocumented and possessing information-stealing capabilities. By Lucian Constantin Sep 28, 2023 4 mins Cyberattacks Hacking Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe